General

  • Target

    2024-03-06_14d5ed4107c947d91ff62d5aa6ae04c1_floxif_icedid

  • Size

    3.8MB

  • MD5

    14d5ed4107c947d91ff62d5aa6ae04c1

  • SHA1

    4cf9df880c80b54e969d3032e9b58e77bccb012e

  • SHA256

    78a8e9fd726e70504ea60afc5523deee75b96a5c91c11474d54b2a4872b3c3ff

  • SHA512

    b22360f5fd4d5c10d7bf1d13a398bfd2b52df74ff34e8cf26ca60c69acee813db8a3e20ebcfc9e057876ac310c52e09b99e2794712ea6fd3ddad96d3b4369a2a

  • SSDEEP

    49152:GAeXiLydsq4frGXSw7yi50369hGDwe16wAg+geOP3Mz17n8TEwk:GAiiO2q4Tdw7ny369o516wAZOPcZb8Te

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs

Files

  • 2024-03-06_14d5ed4107c947d91ff62d5aa6ae04c1_floxif_icedid
    .exe windows:4 windows x86 arch:x86

    db9f5de780c583dec51ccd095520317a


    Code Sign

    Headers

    Imports

    Sections